HN Gopher Feed (2017-07-26) - page 1 of 10 ___________________________________________________________________
Remotely Compromising Android and iOS via a bug in Broadcom's WI-FI
Chipsets
111 points by pedro84
https://blog.exodusintel.com/2017/07/26/broadpwn/___________________________________________________________________
mangix - 10 minutes ago
I do wonder why most mobile chips are broadcom. There's decent
competition from Qualcomm atheros and mediatek.
shock - 2 hours ago
This is kind of scary :(. How does one ensure that they aren't
vulnerable to this bug?
ben1040 - 2 hours ago
If your Android OEM has pushed the July 2017 security update to
your device, you're patched.https://source.android.com/security/b
ulletin/2017-07-01#broa...
yodon - 2 hours ago
Out of curiosity, what fraction of Android OEMs push these
security updates promptly (or equivalently what fraction of
Android phones receive these kind of updates regularly)?
ben1040 - 1 hours ago
This page has a table of OEMs/devices that, as of the end of
May, were fewer than 60 days behind on patches.https
://android-developers.googleblog.com/2017/06/2017-andro...To
me, the takeaway from this is that unless you are using a
"flagship" device, or one sold directly by Google, you're
probably not getting updates in a timely manner.
thrownblown - 1 hours ago
Manufacturer: Device(S)BlackBerry: PRIVFujitsu:
F-01JGeneral Mobile: GM5 Plus d, GM5 Plus, General Mobile
4G Dual,General Mobile 4GGionee A1Google: Pixel XL,
Pixel, Nexus 6P, Nexus 6, Nexus 5X, Nexus 9LGE: LG G6, V20,
Stylo 2 V, GPAD 7.0 LTEMotorola: Moto Z, Moto Z DroidOppo:
CPH1613, CPH1605Samsung: Galaxy S8+, Galaxy S8, Galaxy S7,
Galaxy S7 Edge, Galaxy S7 Active, Galaxy S6 Active, Galaxy
S5 Dual SIM, Galaxy C9 Pro, Galaxy C7, Galaxy J7, Galaxy
On7 Pro, Galaxy J2, Galaxy A8, Galaxy Tab S2 9.7Sharp:
Android One S1, 507SHSony: Xperia XA1, Xperia XVivo: Vivo
1609, Vivo 1601, Vivo Y55
mjevans - 1 hours ago
The supported Pixel and Nexus phone lines get things
quickly.There isn't any third party customization to re-
validate.
pedro84 - 2 hours ago
Apple released fixes for both macOS and iOS last
week:https://support.apple.com/en-us/HT207923
https://support.apple.com/en-us/HT207922
excalibur - 2 hours ago
Don't use any devices with a Broadcom Wi-Fi chipset.
merb - 2 hours ago
which basically means don't use any wifi. I think at least 60%
of all wi-fi chipsets are broadcom ones.
0xdeadbeefbabe - 30 minutes ago
It is pretty hard to ensure you are vulnerable.
[deleted]
spudlyo - 2 hours ago
If you have an iPhone make sure you're on iOS 10.3.3. For Macs,
you want macOS 10.12.6.
Animats - 31 minutes ago
C's lack of array size info strikes again:
memcpy(current_wmm_ie, ie->data, ie->len); where "ie" points to
data obtained from the net.
revelation - 6 minutes ago
C's lack of arrays strikes again. They are essentially syntactic
sugar.
yifanlu - 1 hours ago
The article mentions> Broadpwn is a fully remote attack against
Broadcom?s BCM43xx family of WiFi chipsets, which allows for code
execution on the main application processor in both Android and
iOS.But it doesn't go into any details on this privilege escalation
actually works for iOS and more specifically that it doesn't
require additional exploits. Can anyone explain this in more
detail? If this actually allows code execution on iOS application
processor, that means we have a jailbreak right?